Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D641FFF1D285A43A22B2C6C5FB79BB35A1C7045CED422343C6F462BD1AC9D75A40361E |
|
CONTENT
ssdeep
|
24:kq/JsAX/LDiNP1la5pJDkSg1t2lYA86MQiqkTA5uAOhxCFbMQC+bMBCsubt:VpPLD4P1loOv1thQeTA5mmPrt |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
85ff911b3a906ee0 |
|
VISUAL
aHash
|
0cfff3000000ff00 |
|
VISUAL
dHash
|
384a8aaa23f69c8c |
|
VISUAL
wHash
|
ffffff000000ff00 |
• Threat: Domain squatting
• Target: Bet365 users
• Method: Impersonating Bet365 with a lookalike domain
• Exfil: Unknown, likely redirects or malware download
• Indicators: Domain mismatch, suspicious domain name, Chinese text
• Risk: HIGH - Potential for phishing and malware distribution
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain